21.09.2015 Views

presentation departments reproduced

Spring 2004 - Air and Space Power Journal - Air Force Link

Spring 2004 - Air and Space Power Journal - Air Force Link

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

80 AIR & SPACE POWER JOURNAL SPRING 2004<br />

Air Force ground, air, cyber, and space systems.<br />

Broad areas of investment in science and technology<br />

include upper-level information fusion,<br />

communications, EBO, collaboration environments,<br />

distributed-information infrastructures,<br />

modeling and simulation, intelligent agents,<br />

information assurance, information management,<br />

and intelligent information systems and<br />

databases. Successful outcomes from these<br />

areas provide affordable capability options required<br />

for Air Force information dominance<br />

and air and space superiority. To provide these<br />

capabilities, the AFRL/IF has three major<br />

thrusts—Global Awareness, Dynamic Planning<br />

and Execution, and the Global Information<br />

Enterprise—that receive support from seven<br />

technology-focus areas: information exploitation,<br />

information fusion and understanding,<br />

information management, advanced computing<br />

architectures, cyber operations, air and<br />

space connectivity, and C2.<br />

Information Exploitation<br />

Given the growing threat of global terrorism,<br />

the potential use and exploitation of readily<br />

available information technology by our adversaries<br />

make it imperative that the United States<br />

continue to invest in technologies for the protection<br />

and authentication of digital information<br />

systems for the military and homeland defense.<br />

Toward that end, the AFRL/IF conducts<br />

advanced research and development in the<br />

field of digital data-embedding technology.<br />

The directorate’s work in such areas as information<br />

hiding, steganography, watermarking,<br />

steganalysis, and digital data forensics will<br />

greatly enhance war fighters’ ability to exploit<br />

enemy systems while providing greater security<br />

to ensure that an adversary does not have access<br />

to US and allied systems.<br />

Information Fusion and Understanding<br />

What is going on? Who is the adversary? What<br />

is he up to? Such questions are being addressed<br />

in the emerging area of fusion 2+ or<br />

situational awareness (fig. 3). Over the past<br />

decade, the term fusion has become synonymous<br />

with tactical or battlespace awareness<br />

after hostilities have begun. As such, work has<br />

concentrated on identifying objects, tracking<br />

01010101010<br />

Continuously assess global<br />

conditions and events<br />

Establish and maintain<br />

battlespace situational<br />

awareness<br />

Locate, identify, track, and<br />

observe/monitor friendly,<br />

enemy, nonfriendly, and<br />

nonaligned forces/actors<br />

on the battlefield in near<br />

real time<br />

Figure 3. Fusion 2+

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!